Department of Information Technology, P.R.M.I.T& R Badnera, India
|
|
- Beverley Floyd
- 5 years ago
- Views:
Transcription
1 Volume 5, Issue 4, April 2015 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Special Issue on Impact of Technology on Skill Development Conference Held at IETE Amravati Center, Maharashtra, India The Effectiveness of Request Redirection for Web Services 1 Prof. Preeti V. Dudhe, 2 Rachana N. Sawade 1 Assistant Professor 2 Student Master of Engineering, 1, 2, Department of Information Technology, P.R.M.I.T& R Badnera, India Abstract It is becoming increasingly common to construct network services using redundant resources geographically distributed across the Internet. Networks are a prime example. Such systems sends client requests to an appropriate server based on a variety of factors-- e.g., server load, network proximity, cache locality--in an effort to reduce response time and increase the system capacity under load. This paper introduce a heavily loaded application can sometimes crash due to transactional overload. An application can be deployed on multiple servers. This application implements a redirection server which analyzes the workload on each server and maintains a load database. Depending on the workload on the servers the new work will be allocated and excess load is avoided for smooth performance, hence the concept of request redirection is required. To explain the concept of redirection we have choose the example of ATM banking. Here a thin client is making a request which is pass on to the visa server which in turn analyze the request and then redirects it to the particular bank server. The bank server then handle the request and return the processed information back to visa server, which finally sends it to user. Index Terms Redirection, Server load, Network proximity, Cache locality. I.INTRODUCTION The explosive growth of traffic on the World Wide Web is causing a rapid increase in the request rate to popular Websites. This site can suffer from severe congestion, especially in conjunction with special events; the administrators of popular sites constantly face the need of improving the capacity of their Web-servers to meet the demands of the users. One approach to handle popular Web sites is based on the replication of information across a mirrored-server architecture, which provides a list of independent URL sites that have to be manually selected by the users. A more promising solution is to rely on a distributed architecture that can route incoming requests among several server nodes in a user-transparent way. This approach can potentially improve throughput performance and provide Web-server systems with high scalability and availability. However, a number of challenges must be addressed to make a distributed server cluster function efficiency as a single server within the framework of the HTTP protocol and Web browsers. In this paper we describe and discuss the various approaches on routing requests among the Web-server nodes. We analyze the efficiency and the limitations of the different techniques and the tradeoff among the alternatives. The scope of this paper is not to describe the detailed technical features of each approach, for which we refer the reader to the appropriate literature. Its aim is rather to analyze the characteristics of each approach and its effectiveness on Web-server scalability[1]. In today s world, more or less, every activity belongs to internet. The increase of E-Commerce has leads many businesses to carry out the most of their day-to-day business online transaction on data. As a result of the popularity of the web, providers of web sites and storage space providers want to ensure the availability of access to information for their users and the guarantee that requests are processed as quickly as possible [2]. Every human activity, business activity etc is completely or partially dependent on the computer and on computer network. The most common one we perform is of banking transaction. No one likes to stand in a queue for withdrawing their money. So the concept of ATM was introduced. It eased the work to some extent. But this ease was short lived as the number of ATM users grew exponentially every year. With this their arouse the need to open more and more ATM hereby increasing burden on banks. Then came on to develop such a centralized system which can connect various banks throughout the world, thereby reducing burden on the banks. With this new functioning arouse the need of redirection. The ATM all over the world are now connected to some central servers that redirects the request to particular bank servers and then act as connection link between the banks and clients.this has led to big technological boom in banking sector. 2015, IJARCSSE All Rights Reserved Page 234
2 II. LITERATURE REVIEW responsibility of Netscape browser to randomly chose one of these when user accessed This approach is not useful because it is not scalable. The key concept of this paper is basically request redirection. If redirection is considered in abstract sense then it is basically diverting the request to some other location. There are various form of redirection implemented on internet. The various forms of redirection are implemented for various types of applications and various types of needs. It is very powerful tool which is mostly needed to meet the various application requirements, like to maintain load to handle different request types, to optimize resource utilization etc. We are also required to know of the various technology used to implement the redirection concept. The various theoretical back ground required to know before concentrating on the paper development are described as below. A. Definition of Redirection Redirection is basically the process of diverting the request to a particular location and identifying the request. The server identifies the request type based on the defined parameters and the request to the appropriate server and vice versa. The parameters for identifying the request can be IP address, request type, some id etc. Clustered server organization is preferable to multiple independent mirrored-servers because it maintains a single interface to the users and has the potential to be more scalable, fault-tolerant and better load balanced. Requestredirection occurs over distributed sets of servers, minimizing redirection cost. B. Need of Redirection Today we perform various human activities; There are various reasons to do redirection. On the computer network redirection mechanism is very common and is applied in a number of situations: When a single server passes the request to many other servers. Redirection is primarily needed for the load balancing. For popular websites, it is not possible for a single machine to serve all the requests. So several servers are in operation simultaneously, sharing the load. Redirection is also needed when the website has been shifted. Similar domain names, moving a site to a new domain, Logging outgoing links short, meaningful, persistent aliases for long or changing URL s. C. Method of Redirection Once a server is chosen, this involves how to do the redirection. Redirection can be done at various levels: 1.Application level, using HTTP redirect 2. IP level 3. Using DNS [3] DNS- based approaches There is a single name used for the website. The client will ask DNS server for the IP address of the server. At that time, DNS server can choose an appropriate mirror and return its IP address. All mirrors have different IP addresses. Disadvantages: The major problem with this approach is caching. The DNS responses are coached by intermediate DNS servers and by the client also. So for the time a response is cached, all the requests using that will go to the same mirror. As a result, that mirror may get overloaded. So this allows only a coarse grained redirection. The authority name server has only a limited control over caching. Another obvious disadvantage is that it increases the load on DNS server. Dispatcher-based approaches In this approach, there is a central server called dispatcher which receives all the requests and then redirects the requests to appropriate server replicas. The dispatcher has a single IP address and identifies individual servers through some other address. In this approach also, there can be redirection at different levels. The possibilities depend on whether all replicas are on a LAN or are spread on a WAN. Server-based approaches In this approach, one of the mirrors, on getting an HTTP request, may decide to redirect the client to another mirror. Again, the redirection may happen at different levels: IP level with packet rewriting or at HTTP level. But it is generally done at the HTTP level. This approach is used along with another approach like DNS-based redirection. DNS-based redirection provides coarse grained redirection and this approach provides the fine-grained redirection if required. [4][5] III. SYSTEM ANALYSIS & DESIGN The system is divided into three modules, these modules are: Thin client Central server Bank server Client Side approaches In this approach, it is the responsibility of client (typically a browser) to choose a server out of the available mirrors. Earlier, Netscape had several server names www1, www2, www3.. And it was Fig1: Working Model of System Design 2015, IJARCSSE All Rights Reserved Page 235
3 A. Thin client Server side It is nothing but the ATM machines or user interfaces, Client side it is called as thin client because, it has no database or lot of request handling programs. It only consists of some user interfaces so that the user can interact and then transforms the requests into packets to transmit it to the central server ATM Working ATM cards use processors to connect to their various ATM networks. when someone swipes Or insert a debit card or credit card it asks for a pin number. So ATM machine at that time will dial a toll free number to begin the authorization process. ATM will be re-programmed with the TID(terminal ID number) that will identify it on our processor so the network will allow the transaction to complete.this TID along with other identifying information lets the cardholder bank know that the transaction is taking place on your ATM. If there are sufficient funds in the ATM cardholders account for the withdrawal request, the transaction will be completed. The ATM receives the authorization and dispenses the cash requested. Design of Thin Client Like if we consider that whenever we have to use ATM we have to first insert Acc no. and PIN. This is a general format diagram where we will pass on the information and then will click the button to login. On a general basis these two parts can be performing the following functions, the client side will accept the request from the clients change it into some form and add some information to it and then pass it over to other side which will analyses the information and then pass it over respective bank servers and finally will take response from bank servers and give it to client side to hand it over to the clients. Client Manager This part of the central server has the basic job of accepting the packets from client side, add some more information to it, generate a thread and then pass it onto the server manager. Now let us look into details of its function: The client manger is basically responsible for connection to the client/atm. Creating a socket for connection. Receiving and sending data from the socket for that particular connection. Identifying the particular bank. Ask the server manager to create a dedicated connection with the bank. Sending and receiving of data. Working Of the Client Manager B. Visa Server Fig3: Working Model of client manager Fig2: Working Model of Visa Server The central server plays the main role. This central server has to perform the job of connecting link between client and various bank servers. This server has to basically receive the request from client and send it back to bank server and then take request from bank server and send it to clients. Thus we think that central server performs the main job of redirection, so it can be broadly classified as: The main work of the client manager is to handle client side of working, for this it will require to sense a client and establish the connection. So for this particular purpose,the client server will be continuously listens the connections for the presence of the client, now if a client is found then it will establish a socket so that it can receive information in the form of packets. Now the next task is to identify the bank for the packet which has come. this is problem, as there are many ATMs and many banks, how will it recognize that the particular is for which bank. Now the standard 2015, IJARCSSE All Rights Reserved Page 236
4 solution to this problem which modern ATMs follow is that every card has particular id and few digits. So the client manager identifies the bank id. Now it will ask server manager to establish connection with respective banks server,and further packets are received and taken. Server Manager This server manager basically establishes the connection with bank server and send the packet of information. The basic requirements of the server manager are as follows: Maintain the bank server information Establish the connection with the bank server Maintain connection status information Generate commands from the received packets Working of Server Manager The server manager as the name suggest is mainly responsible for maintaining the server side connections and information. Now whenever the client manager asks the server manager to establish a dedicated connection with the respective bank it first has to check number of things. So in order to establish the connection we require the IP address and port numbers, so we can store the IP address of bank we can easily establish a connection. For this purpose a database is maintained by the server manager, which mainly consists of information like banks name, its IP address,its port number, connection is established or not etc. Now when the central server is started this server manager looks into its data base to find which all banks it can connect and then try establishing connection with each on of them. Then create and maintain server connection status information. C. Bank Server Bank server it is console type application. It is connected to database, it has request handler to receive the request. The bank server content all information about the client while it connected to main server. It contents the client account id number, pin code, acc no; name..etc such type of information. Goals of bank server: Banking system comprise a host computer and at least one portable terminal The terminal provide arrange of banking service over an connection to the host bank computer During a banking mode of operation control reside in the host bank computer The borrowing raising or taking up of money. IV. IMPLEMENTATION AND TESTING In multithreading multiple threads are created for each program so that first processing is achieved. Our main focus is on client side. There are multiple clients sending multiple requests which are received by the main server and the main server will create the thread of request and send it to the particular database depending on the request. The main modules are: Bank Server Main Server ATM Server We have various banks having their own database which stores the information about the customer. Also, there is one bank server used for redirection purpose. There are many databases having the information of particular bank. There are various ATM clients sending the request to the main server. The associated threads are created by the server and then forwarded to the specific bank database. In the ATM interface we start by entering the bank id along with valid password through the login form. The banks are identified on the bases of this bank id. First two digits are required for identifying the particular bank and the rest is account number of customer. The identification numbers of banks are as follows: SBI-99 ICICI-88 HDFC-78 If the password is not valid it will give error and you have to enter the right password. After Login the customer can perform his transaction effectively. The customer can withdraw amount, transfer money change the pin, checking balance. Elements of Architecture: A. ATM Clients These are the ATM customers which send their ATM request for their particular ATM services. Now this ATM request includes: Log in Log out Withdrawing money Checking balance Money transfer Change of pin B. Main Server Whatever request is given by ATM clients its associated threads are created inside the main server. These threads are redirected to the respective banks. Also, the ATM client can send many request at a time out of that, only one request are forwarded and rest are blocked. These threads handovers the request to the respective bank database and it get disabled. C. Bank Server The request forwarded by main server in the form of threads is received by bank server depending on the status of the bank database, the query is fired. D. Bank Databases It includes database of SBI, ICICI and HDFC banks. It consists of the table Acc Master having the following fields: Name Account number Password Balance Enabled Credit limit 2015, IJARCSSE All Rights Reserved Page 237
5 V. CONCLUSION Prof. Miss. P. V. Dudhe Author is In this paper we have presented a system which sends Assistant Professor with Department the request to the appropriate server in to reduce response of Information Technology, time and increase the system capacity under load. A P.R.M.I.T&R, Badnera heavily loaded application can sometimes crash due to transactional overload. An application can be deployed on multiple servers. This application implements a redirection server called Visa server which analyzes request and sends Miss. R. N Sawade Author is Student to the server and maintains a load database. Depending on with Department of Information the workload on the servers the new work will be allocated Technology, P.R.M.I.T&R, Badnera and excess load is avoided for smooth performance, hence the concept of request redirection is required. ACKNOWLEDGMENT I take this opportunity of thanking my guide Prof. P. V. Dudhe, Assistant Professor Department of Information Technology Engineering, P.R.M.I.T&R, Badnera for her indispensable guidance, generous help, perpetual encouragement, constant attention offered throughout in preparation of this paper. REFERENCES [1] Valeria Cardellia, Michele Colajanni, Philip.S. Yu Dynamic Load Balancing on Web Server System, Publidhe by IEEE Internet Computing /99. [2] L. Garber. Technology news: Denial-of-service attacks rip the Internet. Computer, 33(4):12-17, Apr [3] Limin Wang, Vivek Pai and Larry Peterson, The Effectiveness of Request Redirection on CDN Robustness USENIX Association 5th Symposium on Operating Systems Design and Implementation [4] Ankush P. Deshmukh, Prof. Kumarswamy Pamu, Applying Load Balancing: A Dynamic Approach, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 6, June 2012 [5] D. Andresen, T. Yang, V. Holmedahl, and O. Ibarra. Sweb: Towards a scalable world wide web server on multicomputers, 1996 [6] P.Barford M. Carvello Genrating representive Web Workload for network and sever performance evaluation, Proc of ACM Sigmetic 98,Madsion, WI, pp ,june , IJARCSSE All Rights Reserved Page 238
An Enhanced Binning Algorithm for Distributed Web Clusters
1 An Enhanced Binning Algorithm for Distributed Web Clusters Hann-Jang Ho Granddon D. Yen Jack Lee Department of Information Management, WuFeng Institute of Technology SingLing Lee Feng-Wei Lien Department
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationJim Metzler. Introduction. The Role of an ADC
November 2009 Jim Metzler Ashton, Metzler & Associates jim@ashtonmetzler.com Introduction In any economic environment a company s senior management expects that their IT organization will continually look
More informationProf. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra
Resource Management Using Dynamic Load Balancing in Distributed Systems Prof. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra Abstract In a distributed
More informationCHAPTER 7 CONCLUSION AND FUTURE SCOPE
121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution
More informationChapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.
Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks
More informationA QoS Load Balancing Scheduling Algorithm in Cloud Environment
A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in
More informationIndex Terms Authentication, Authentication technique, Cloud computing, Computing services, Multilevel authentication.
Volume 5, Issue 4, April 015 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on Impact
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationIntroduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:
1 CHAPTER Introduction Practice Exercises 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: To provide an environment for a computer user to execute programs
More informationPRACTICE QUESTIONS FOR FINAL EXAMINATION Spring 2005
PRACTICE QUESTIONS FOR 15.561 FINAL EXAMINATION Spring 2005 CLARIFICATION: This is not a practice final but a collection of questions similar to those likely to be on the final. COMPUTER FUNDAMENTALS PRACTICE
More informationRadware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA)
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA) INTRODUCTION... 2 SOLUTION DETAILS... 3 HOW IT WORKS... 3 SOFTWARE
More informationEVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER
WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationLarge-Scale Web Applications
Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out
More informationLoad balancing algorithms in cluster systems
Load balancing algorithms in cluster systems Andrzej Imiełowski 1,* 1 The State Higher School of Technology and Economics in Jarosław, Poland Abstract. The beginning of XXI century brought dynamic rise
More informationDistributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:
Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that
More informationDesigning Issues For Distributed Computing System: An Empirical View
ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationChapter 18: Database System Architectures.! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems!
Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and
More informationA Semi-Distributed Load Balancing Algorithm Using Clustered Approach
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.843
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationR (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.
R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:
More informationCCDP-ARCH. Section 11. Content Networking
CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures
More informationParadigm Shift of Database
Paradigm Shift of Database Prof. A. A. Govande, Assistant Professor, Computer Science and Applications, V. P. Institute of Management Studies and Research, Sangli Abstract Now a day s most of the organizations
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Campus Area Network Automation Prof. Bhavana Khivsara 1, Monika S. Firodiya
More informationDeploying the BIG-IP System v10 with Oracle s BEA WebLogic
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter
More informationDesign and Implementation of Search Engine Using Vector Space Model for Personalized Search
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA New HadoopBased Network Management System with Policy Approach
Computer Engineering and Applications Vol. 3, No. 3, September 2014 A New HadoopBased Network Management System with Policy Approach Department of Computer Engineering and IT, Shiraz University of Technology,
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More informationGRID SIMULATION FOR DYNAMIC LOAD BALANCING
GRID SIMULATION FOR DYNAMIC LOAD BALANCING Kapil B. Morey 1, Prof. A. S. Kapse 2, Prof. Y. B. Jadhao 3 1 Research Scholar, Computer Engineering Dept., Padm. Dr. V. B. Kolte College of Engineering, Malkapur,
More informationAssignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points.
Assignment #2 Csci4211 Spring 2017 Due on March 6th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Design and describe an application-level protocol
More informationLOAD BALANCING ALGORITHMS ROUND-ROBIN (RR), LEAST- CONNECTION, AND LEAST LOADED EFFICIENCY
LOAD BALANCING ALGORITHMS ROUND-ROBIN (RR), LEAST- CONNECTION, AND LEAST LOADED EFFICIENCY Dr. Mustafa ElGili Mustafa Computer Science Department, Community College, Shaqra University, Shaqra, Saudi Arabia,
More informationDistributed System: Definition
2 / 25 Introduction Distributed System: Definition Definition A distributed system is a piece of software that ensures that: a collection of independent computers appears to its users as a single coherent
More informationChapter 20: Database System Architectures
Chapter 20: Database System Architectures Chapter 20: Database System Architectures Centralized and Client-Server Systems Server System Architectures Parallel Systems Distributed Systems Network Types
More informationInternet Content Distribution
Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:
More informationCA464 Distributed Programming
1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook
More informationLecture 1: January 23
CMPSCI 677 Distributed and Operating Systems Spring 2019 Lecture 1: January 23 Lecturer: Prashant Shenoy Scribe: Jonathan Westin (2019), Bin Wang (2018) 1.1 Introduction to the course The lecture started
More informationSurvey on Incremental MapReduce for Data Mining
Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 Web Search Engine Crawling Indexing Computing
More informationChapter 1: Distributed Information Systems
Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 CS 347 Notes 12 5 Web Search Engine Crawling
More informationFrom Internet Data Centers to Data Centers in the Cloud
From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs
More informationTake Back Lost Revenue by Activating Virtuozzo Storage Today
Take Back Lost Revenue by Activating Virtuozzo Storage Today JUNE, 2017 2017 Virtuozzo. All rights reserved. 1 Introduction New software-defined storage (SDS) solutions are enabling hosting companies to
More informationModel-Based Systems Engineering: Documentation and Analysis
Week 1: What Is MBSE? Project Name Jane Doe 1 Instructions Before you begin, you should save your Project Portfolio on your local drive. We recommend the following format: Lastname_Firstname_Course3_Week1
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationFundamental Research of Distributed Database
International Journal of Computer Science and Management Studies, Vol. 11, Issue 02, Aug 2011 138 Fundamental Research of Distributed Database Swati Gupta 1, Kuntal Saroha 2, Bhawna 3 1 Lecturer, RIMT,
More informationModelling and Analysis of Push Caching
Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Pa Available online at: Analysis of Network Processor Elements Topologies Devesh Chaurasiya
More informationFactsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03
Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 1 Objective of Paper 1.1 This document provides an overview of the Public Services Infrastructure (PSi). 2 Overview of PSi 2.1 PSi
More informationDatacenter replication solution with quasardb
Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION
More informationA Step By Step Guide To Use PayPal
A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking
More informationPeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs
PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary
More informationCS533 Concepts of Operating Systems. Jonathan Walpole
CS533 Concepts of Operating Systems Jonathan Walpole SEDA: An Architecture for Well- Conditioned Scalable Internet Services Overview What does well-conditioned mean? Internet service architectures - thread
More informationLecture 1: January 22
CMPSCI 677 Distributed and Operating Systems Spring 2018 Lecture 1: January 22 Lecturer: Prashant Shenoy Scribe: Bin Wang 1.1 Introduction to the course The lecture started by outlining the administrative
More informationClient Server & Distributed System. A Basic Introduction
Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationPACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationAmazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction:
Amazon ElastiCache Introduction: How to improve application performance using caching. What are the ElastiCache engines, and the difference between them. How to scale your cluster vertically. How to scale
More informationVERITAS Volume Replicator. Successful Replication and Disaster Recovery
VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationSelection of a Scheduler (Dispatcher) within a Datacenter using Enhanced Equally Spread Current Execution (EESCE)
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 8 Issue 01 Series. III Jan 2019 PP 35-39 Selection of a Scheduler (Dispatcher) within
More informationIntroduction CHAPTER. Exercises
1 CHAPTER Introduction Chapter 1 introduces the general topic of operating systems and a handful of important concepts (multiprogramming, time sharing, distributed system, and so on). The purpose is to
More informationA Methodology in Mobile Networks for Global Roaming
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationA Top Catching Scheme Consistency Controlling in Hybrid P2P Network
A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),
More informationTechnical papers Web caches
Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability
More informationTriScale Clustering Tech Note
TriScale Clustering Tech Note www.citrix.com Table of Contents Expanding Capacity with TriScale Clustering... 2 How Clustering Works... 2 Cluster Communication... 3 Cluster Configuration and Synchronization...
More informationDEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER Deploying the BIG-IP LTM system for BEA WebLogic Server F5 Networks and BEA systems have created a highly effective way to direct traffic
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationEnterprise print management in VMware Horizon
Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable
More information1. Introduction. 2. Salient features of the design. * The manuscript is still under progress 1
A Scalable, Distributed Web-Crawler* Ankit Jain, Abhishek Singh, Ling Liu Technical Report GIT-CC-03-08 College of Computing Atlanta,Georgia {ankit,abhi,lingliu}@cc.gatech.edu In this paper we present
More informationCommunication Networks
Communication Networks Prof. Laurent Vanbever Solution: Exercises week 15 E-mail and recap E-mail Answer the following questions about e-mail with True or False and justify your choice. a) SMTP and IMAP
More informationDistributed Scheduling for the Sombrero Single Address Space Distributed Operating System
Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.
More informationToday s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications
CSE 123b Communications Software Spring 2004 Today s class Quick examples of other application protocols Mail, telnet, NFS Content Distribution Networks (CDN) Lecture 12: Content Distribution Networks
More informationISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW
ISP Network Design PoP Topologies and Design ISP and IXP Design Backbone Design Addressing INET 2000 NTW Routing Protocols Security Out of Band Management IXP/IXP Workshops 1999, Cisco Systems, Inc. 1
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system
More informationLogical File Organisation A file is logically organised as follows:
File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting records from a variety
More informationWHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures
ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director
More informationHighly Available Forms and Reports Applications with Oracle Fail Safe 3.0
Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 High Availability for Windows NT An Oracle Technical White Paper Robert Cheng Oracle New England Development Center System Products
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks
ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing
More informationDesign and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs
Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,
More informationSurveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web
Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationCSCI 4717 Computer Architecture
CSCI 4717/5717 Computer Architecture Topic: Symmetric Multiprocessors & Clusters Reading: Stallings, Sections 18.1 through 18.4 Classifications of Parallel Processing M. Flynn classified types of parallel
More informationCOMPUTER SKILLS COMP101
COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources
More informationClient-server Basics. 1. Motivation
Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationLecture 05 Application Layer - I
Computer Networks and Internet Protocol Prof. Soumya Kanti Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 05 Application Layer - I Hi. So, we will
More informationLecture 23 Database System Architectures
CMSC 461, Database Management Systems Spring 2018 Lecture 23 Database System Architectures These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used
More informationReplication in Distributed Systems
Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over
More informationIntrusion Detection Using Data Mining Technique (Classification)
Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,
More informationRunning the Setup Web UI
The Cisco Prime IP Express setup interview in the web UI takes you through a series of consecutive pages to set up a basic configuration. For an introduction and details on the basic navigation for the
More informationCSE544 Database Architecture
CSE544 Database Architecture Tuesday, February 1 st, 2011 Slides courtesy of Magda Balazinska 1 Where We Are What we have already seen Overview of the relational model Motivation and where model came from
More information